diff options
-rw-r--r-- | PowerSploit.psd1 | 4 | ||||
-rw-r--r-- | PowerSploit.psm1 | 2 | ||||
-rwxr-xr-x | Recon/PowerView.ps1 | 10 |
3 files changed, 8 insertions, 8 deletions
diff --git a/PowerSploit.psd1 b/PowerSploit.psd1 index 065ea68..3b6976f 100644 --- a/PowerSploit.psd1 +++ b/PowerSploit.psd1 @@ -90,11 +90,11 @@ FunctionsToExport = @( 'Get-RegistryAutoLogon', 'Get-SecurityPackages', 'Get-ServiceDetail', - 'Get-ServiceUnquoted', 'Get-SiteListPassword', 'Get-System', 'Get-TimedScreenshot', 'Get-UnattendedInstallFile', + 'Get-UnquotedService', 'Get-UserEvent', 'Get-UserProperty', 'Get-VaultCredential', @@ -103,7 +103,6 @@ FunctionsToExport = @( 'Install-ServiceBinary', 'Install-SSP', 'Invoke-ACLScanner', - 'Invoke-AllChecks', 'Invoke-CheckLocalAdminAccess', 'Invoke-CredentialInjection', 'Invoke-DllInjection', @@ -114,6 +113,7 @@ FunctionsToExport = @( 'Invoke-Mimikatz', 'Invoke-NinjaCopy', 'Invoke-Portscan', + 'Invoke-PrivescAudit', 'Invoke-ProcessHunter', 'Invoke-ReflectivePEInjection', 'Invoke-ReverseDnsLookup', diff --git a/PowerSploit.psm1 b/PowerSploit.psm1 index 9bc0240..42a9174 100644 --- a/PowerSploit.psm1 +++ b/PowerSploit.psm1 @@ -1 +1 @@ -Get-ChildItem $PSScriptRoot | ? { $_.PSIsContainer -and ($_.Name -ne 'Tests') } | % { Import-Module $_.FullName -DisableNameChecking } +Get-ChildItem $PSScriptRoot | ? { $_.PSIsContainer -and !('Tests','docs' -contains $_.Name) } | % { Import-Module $_.FullName -DisableNameChecking } diff --git a/Recon/PowerView.ps1 b/Recon/PowerView.ps1 index c6cb5ff..487ed09 100755 --- a/Recon/PowerView.ps1 +++ b/Recon/PowerView.ps1 @@ -6634,19 +6634,19 @@ System.Security.AccessControl.AuthorizationRule [ValidateSet('AccessSystemSecurity', 'CreateChild','Delete','DeleteChild','DeleteTree','ExtendedRight','GenericAll','GenericExecute','GenericRead','GenericWrite','ListChildren','ListObject','ReadControl','ReadProperty','Self','Synchronize','WriteDacl','WriteOwner','WriteProperty')] $Right, - [Parameter(Mandatory = $True, ParameterSetName=’AccessRuleType’)] + [Parameter(Mandatory = $True, ParameterSetName='AccessRuleType')] [ValidateSet('Allow', 'Deny')] [String[]] $AccessControlType, - [Parameter(Mandatory = $True, ParameterSetName=’AuditRuleType’)] + [Parameter(Mandatory = $True, ParameterSetName='AuditRuleType')] [ValidateSet('Success', 'Failure')] [String] $AuditFlag, - [Parameter(Mandatory = $False, ParameterSetName=’AccessRuleType’)] - [Parameter(Mandatory = $False, ParameterSetName=’AuditRuleType’)] - [Parameter(Mandatory = $False, ParameterSetName=’ObjectGuidLookup’)] + [Parameter(Mandatory = $False, ParameterSetName='AccessRuleType')] + [Parameter(Mandatory = $False, ParameterSetName='AuditRuleType')] + [Parameter(Mandatory = $False, ParameterSetName='ObjectGuidLookup')] [Guid] $ObjectType, |